Search results for "Crypt"

showing 10 items of 1111 documents

Academics as Politicians and as Operators of Global Governance

2018

In this chapter, the author scrutinizes the links between politics and academe in global governance. He analyzes two cases, those of former president of the European Commission Jose Manuel Barroso and philosopher Michel Foucault, that exemplify different types of political engagement. Social scientists play a key but concealed part in the steering of global governance. Under and beyond global institutions, they partake in the development of influential transnational professional groups. By producing practical knowledge for everyday or ‘banal’ global governance, social scientists shape the politically imaginable at more institutional levels. Yet others provide at a higher level of abstractio…

PoliticsMichel foucaultPolitical scienceReflexivityKey (cryptography)European commissionPolitical engagementAbstractionPublic administrationGlobal governance
researchProduct

Analysis of the road traffic-induced pollution in two areas of Sibiu, Romania

2017

The current paper details a computer-aided research of the emission levels in two areas of the city of Sibiu, Romania. The research started from the numbers of motor vehicles passing through key segments of those two areas, located at entry points into the city of Sibiu. Using the software package Synchro Studio 7 and SimTraffic 7, the targeted crossroad areas were modelled and key indicators for the road traffic efficiency and for the emission levels were determined. These emission levels were then compared to real measured pollution values, which allowed both to assess the accuracy of the modelling and the influence of other pollution sources on the emission levels in those areas.

Pollutionmedia_common.quotation_subject0211 other engineering and technologies02 engineering and technologySoftware packageTransport engineeringSynchro020303 mechanical engineering & transports0203 mechanical engineeringlcsh:TA1-2040021105 building & constructionKey (cryptography)lcsh:Engineering (General). Civil engineering (General)Road trafficmedia_commonMATEC Web of Conferences
researchProduct

Symbolic Worst Case Execution Times

2011

In immediate or hard real-time systems the correctness of an operation depends not only upon its logical correctness, but also on the time in which it is computed. In such systems, it is imperative that operations are performed within a given deadline because missing this deadline constitutes the failure of the complete system. Such systems include medical systems, flight control systems and other systems whose failure in responding punctually results in a high economical loss or even in the loss of human lives. These systems are usually analyzed in a sequence of steps in which first, a socalled control flow graph (CFG) is constructed that represents possible program flows. Furthermore, bou…

PolynomialSequenceCorrectnessWorst-case execution timeComputer scienceCode (cryptography)Control flow graphInteger programmingAlgorithmLongest path problem
researchProduct

Anti-proliferative effect of main dietary phytosterols and β-cryptoxanthin alone or combined in human colon cancer Caco-2 cells through cytosolic Ca+…

2015

β-cryptoxanthin (β-Cx) and phytosterols (Ps) have potential against different cancer types, including colon cancer. However, their combined action has not been reported so far. Human colon cancer Caco-2 cells were treated 24 h with β-Cx and/or main dietary Ps (β-sitosterol, campesterol and stigmasterol), alone or in combination, at concentrations compatible with physiological human serum levels. A decrease in cell viability due to apoptosis (rise in sub-G1 population and exposure of membrane phosphatidylserine) was accompanied with dephosphorylation of BAD, mitochondrial depolarization and caspase 3-dependent PARP cleavage, with intracellular Ca2+ influx and increase of RONS levels as initi…

PopulationMedicine (miscellaneous)ApoptosisPharmacologymedicine.disease_causeβ-Cryptoxanthinchemistry.chemical_compoundSettore BIO/10 - BiochimicamedicineTX341-641educationCaco-2 cellsCaspaseeducation.field_of_studyNutrition and DieteticsbiologyNutrition. Foods and food supplyCancerPhytosterolsPhosphatidylserinemedicine.diseaseAnti-proliferation Apoptosis β-Cryptoxanthin Caco-2 cells PhytosterolsBiochemistrychemistryCaco-2ApoptosisAnti-proliferationbiology.proteinIntracellularOxidative stressFood Science
researchProduct

Characteristic time scale of auroral electrojet data

1994

The structure function of the AE time series shows that the AE time series is self-affine such that the scaling exponent changes at the time scale of approximately 113 (±9) minutes. Autocorrelation function is shown to have scaling properties similar to those of the structure function. From this result it can be deduced that the time scale at which the scaling properties of the AE data change should equal the typical autocorrelation time of these data. We find the typical autocorrelation time of the AE data is 118 (±9) minutes. The characteristic time scale of the AE data appears as a spectral break in their power spectrum at a period of about twice the autocorrelation time.

Power seriesPhysicsSeries (mathematics)MeteorologyScale (ratio)AutocorrelationSpectral densityElectrojetComputational physicsComputer Science::Hardware ArchitectureGeophysicsGeneral Earth and Planetary SciencesTime seriesScalingComputer Science::Cryptography and SecurityGeophysical Research Letters
researchProduct

Conceptualising and contesting ‘fast policy’ in teacher learning: a comparative analysis of Sweden, Finland and Australia

2020

In this article, the authors refer to key national policies, and associated politics, in the Swedish, Finnish and Australian contexts, to reveal the key discourses that characterise how ongoing tea...

Praxismedia_common.quotation_subjectDiscourse analysis05 social sciences050401 social sciences methods050301 educationTeacher learningEducationPolitics0504 sociologyPedagogyKey (cryptography)SociologyComparative educationFaculty development0503 educationmedia_commonTeacher Development
researchProduct

A Generalization of Girod's Bidirectional Decoding Method to Codes with a Finite Deciphering Delay

2012

Girod’s encoding method has been introduced in order to efficiently decode from both directions messages encoded by using finite prefix codes. In the present paper, we generalize this method to finite codes with a finite deciphering delay. In particular, we show that our decoding algorithm can be realized by a deterministic finite transducer. We also investigate some properties of the underlying unlabeled graph.

Prefix codeStrongly connected componentTheoretical computer scienceGeneralizationdeciphering delayData_CODINGANDINFORMATIONTHEORY0102 computer and information sciences02 engineering and technology01 natural sciences[INFO.INFO-FL]Computer Science [cs]/Formal Languages and Automata Theory [cs.FL]Encoding (memory)0202 electrical engineering electronic engineering information engineeringCode (cryptography)Computer Science (miscellaneous)prefix (free) codeunlabeled graphMathematicsCode[MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]020206 networking & telecommunicationsCode; deciphering delay; prefix (free) code; strongly connected component; transducer; unlabeled graph; Computer Science (miscellaneous)Prefixtransducer[INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT]010201 computation theory & mathematicsGraph (abstract data type)strongly connected componentAlgorithmDecoding methods
researchProduct

Hyplets - Multi Exception Level Kernel towards Linux RTOS

2018

This paper presents the concept of a Multi-Exception level operating system. We add a hypervisor awareness to the Linux kernel and execute code in hyp exception level. We do that through the use of Hyplets. Hyplets are an innovative way to code interrupt service routines under ARM. Hyplets provide high performance, security, running time predictability, an RPC mechanism and a possible solution for the priority inversion problem. Hyplets uses special features of ARM8va hypervisor memory architecture.

Priority inversionSoftware_OPERATINGSYSTEMSComputer scienceKernel (statistics)Memory architectureCode (cryptography)Operating systemHypervisorLinux kernelInterruptcomputer.software_genreReal-time operating systemcomputerProceedings of the 11th ACM International Systems and Storage Conference
researchProduct

New Innovation Identification Approach Development Matrix

2018

Innovations have become one of the contemporary economics key driving forces behind competitive advantages and have become socioeconomic category of their own. Diffusion of innovations, which is an integral part of the scientific and technological base of national economies, promotes structural changes in economy. Companies have to pay close attention to market trends and have to be able to identify and create new innovations, thus increasing their competitiveness and meeting consumer demands and expectations. The objective of this research is to evaluate the concept of different innovations in organizations and propose a complex approach to identifying innovations in the form of a matrix t…

Process (engineering)05 social sciencesMatrix (music)Innovation processScientific literature010501 environmental sciences01 natural sciencesCompetitive advantageDiffusion of innovationsComputingMilieux_GENERALIdentification (information)0502 economics and businessKey (cryptography)Business050203 business & managementIndustrial organization0105 earth and related environmental sciences
researchProduct

The role of negative and positive forms of power in supporting CSR alignment and commitment between large firms and SMEs

2018

Do large firms exert power to shape the CSR behavior of their SME partners?” We answer this question by proposing a model built on the stakeholder theory and the shareholder theory, and go on to explain how this impact influences the commitment of the SME towards their large partner. The model highlights the central role that different forms of power exercised by the large firm play in the process. A survey of 291 SMEs confirms the key hypotheses, including the mediating role of reward power. The effects of coercive power are noteworthy and they illustrate the complex and competing forces at play in influencing CSR behavioral change in SMEs. The research makes a novel contribution to practi…

Process (engineering)vallankäyttöCoercionCSR orientationPower (social and political)Shareholderkumppanuusyritysvastuuvaikuttaminen0502 economics and businesssuuryrityksetta512Stakeholder theorynormative commitmentIndustrial organizationMarketing05 social sciencessitoutuminenaffective commitmentCoercive powercontinuance commitmentreward powerKey (cryptography)Corporate social responsibility050211 marketingBusinesscoercive powerpienet ja keskisuuret yritykset050203 business & management
researchProduct